Cloud-native security practicesin IBM Cloud

December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Spotlight

Mosaic451

Mosaic451 provides bespoke cyber operations, analysis, and critical infrastructure defense for high-risk, high-threat, complex and regulated (SOX, PCI, HIPAA, CIP, etc.) organizations in energy, finance, global distribution, government, healthcare, technology, and transportation. We protect complicated data and distribution systems, including water, hydro-electric, generation capacity, and transportation for tens of millions of Americans across the United States. We protect two of Southern California’s most prestigious healthcare systems; 31 hydro projects on the Columbia river basin alone; airports that serve over 90M passengers a year; and nuclear power plants in multiple states. Our operations methodology and leadership were forged in fire. Our team is drawn from the vanguard of US Military and Federal civilian cyber leadership, include the initial cadre of course developers for the USAF’s most prestigious cyber training program, the Cyber Warfare Operations Weapons Instructor

OTHER WHITEPAPERS
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More
news image

Unify data security, privacy, and governance with contextual data classification

whitePaper | November 29, 2022

Enterprise data can be a transformative asset. It can unlock insights and intelligence to fuel innovation, accelerate organizational growth, and create a significant competitive advantage — so long as it’s properly used.

Read More
news image

The Veritas Ransomware Resiliency Strategy

whitePaper | January 19, 2023

The threat of ransomware attacks is a top concern for businesses of all types and sizes. Ransomware attacks have become commonplace with cybercriminals continuously evolving and creating new, more sophisticated ways to deliver attacks. With demands becoming excessive and the risk of data loss increasing, an advanced multi-layered resiliency strategy is needed to help ensure that your IT services are secure, resilient, and recoverable while providing the smooth user experience that your end users expect.

Read More
news image

Warring State - China's cybersecurity strategy

whitePaper | December 1, 2019

Cyberspace and information technology have enabled the economic, political, and cultural inte - gration of the United States and China. However, interdependence creates costs as well as benefits. Increased interconnection has also contributed to major obstacles in the bilateral relationship, generating mutual distrust of incentives, actions, and norms in cyberspace. Information technology raises new challenges for states by allowing actors to exploit networks, conduct cyber espionage, or compromise national security with greater ease.

Read More
news image

Data Security: The Key to Defeating Ransomware Attacks

whitePaper | May 26, 2022

Ransomware attacks have become increasingly pervasive and pernicious. Many organizations have suffered from at least one ransomware attack, and many ransomware victims have unfortunately been left with no resort other than paying the ransom and hoping to recover their data.

Read More

Spotlight

Mosaic451

Mosaic451 provides bespoke cyber operations, analysis, and critical infrastructure defense for high-risk, high-threat, complex and regulated (SOX, PCI, HIPAA, CIP, etc.) organizations in energy, finance, global distribution, government, healthcare, technology, and transportation. We protect complicated data and distribution systems, including water, hydro-electric, generation capacity, and transportation for tens of millions of Americans across the United States. We protect two of Southern California’s most prestigious healthcare systems; 31 hydro projects on the Columbia river basin alone; airports that serve over 90M passengers a year; and nuclear power plants in multiple states. Our operations methodology and leadership were forged in fire. Our team is drawn from the vanguard of US Military and Federal civilian cyber leadership, include the initial cadre of course developers for the USAF’s most prestigious cyber training program, the Cyber Warfare Operations Weapons Instructor

Events